CN105933271A - Data processing method and apparatus based on encoder - Google Patents
Data processing method and apparatus based on encoder Download PDFInfo
- Publication number
- CN105933271A CN105933271A CN201511016898.2A CN201511016898A CN105933271A CN 105933271 A CN105933271 A CN 105933271A CN 201511016898 A CN201511016898 A CN 201511016898A CN 105933271 A CN105933271 A CN 105933271A
- Authority
- CN
- China
- Prior art keywords
- application
- encryption equipment
- encryption
- equipment
- application server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
Abstract
The invention relates to the technical field of communication and discloses a data processing method and apparatus based on an encoder. The data processing method includes that an application server sends the data to be processed of a first application to an encoder of the first application; if the application server doesn't receive the correct response message replied by the encoder of the first application within the first preset time, the application server sends the data to be processed of the first application to an encoder of a second application. According to the invention, the problems of redundancy and waste of encoder resources in the prior art can be solved.
Description
Technical field
The present invention relates to communication technical field, particularly relate to a kind of data processing method based on encryption equipment and dress
Put.
Background technology
At present, along with the becoming increasingly abundant of class of business of the increasingly extensive of network application and different field, borrow
Encryption equipment is helped to carry out safety information (i.e. higher to security requirement information, such as fiscard password etc.)
Become more and more important alternately.
Encryption equipment is a kind of external equipment realizing main frame encryption, for protection or discriminating, the key pipe of message
The aspects such as reason, message integrity control, are one of the key equipments of business procession, are widely used in silver
In the information network of multiple industries such as row, telecommunications, social security, traffic.When encryption equipment fault, communication abnormality,
Or the reason such as encryption equipment edition upgrading is when causing encryption equipment to shut down or be unavailable, will cause at main frame applied business
Reason is interrupted.
In prior art, on the basis of each service application connects a primary encryption equipment, additionally arrange one
The encryption equipment that platform is standby, cannot connect primary encryption equipment etc. no if occurring primary encryption equipment to break down maybe
During situation about can use, it is switched to use standby encryption equipment to process business.So, the most standby
Encryption equipment be not involved in Business Processing, there is encryption equipment redundancy issue, cause the idle waste of resource.
Summary of the invention
The embodiment of the present invention provides a kind of data processing method based on encryption equipment and device, existing in order to solve
The problem of encryption equipment resource redundancy waste in technology.
The data processing method based on encryption equipment that the embodiment of the present invention provides includes:
Application server sends the pending data of described first application to the encryption equipment of the first application;
If the encryption equipment that described application server does not receives described first application in the first Preset Time returns
Multiple correct response message, the most described application server sends described first application to the encryption equipment of the second application
Pending data.
Optionally, described application server sends the pending of described first application to the encryption equipment of the second application
Data, including:
Described application server selects an encryption equipment, wherein, one from the encryption equipment of multiple second application
The second corresponding encryption equipment of application;
What the encryption equipment transmission described first that described application server is applied to second selected was applied waits to locate
Reason data.
Optionally, described application server selects an encryption equipment, bag from the encryption equipment of multiple second application
Include:
The encryption equipment of multiple second application is carried out prioritization by described application server;
Described application server selects the encryption equipment of the second application that priority is the highest.
Optionally, described application server does not receives the encryption of described first application in the first Preset Time
The correct response message that machine is replied, including:
Described application server does not receives the encryption equipment of described first application in described first Preset Time
Response message;Or
Described application server receives the encryption equipment of described first application in described first Preset Time and sends out
The error message sent.
Optionally, described application server sends the pending of described first application to the encryption equipment of the second application
After data, also include:
Described application server judges whether to arrive the second Preset Time, the most then to described first application
Encryption equipment sends the pending data of described first application;
Otherwise, continue to send the follow-up pending number of described first application to the encryption equipment of described second application
According to.
A kind of data processing equipment based on encryption equipment, including:
The direct-connected module of encryption equipment, for sending the pending number of described first application to the encryption equipment of the first application
According to;
Encryption equipment proxy module, if not receiving in the first Preset Time for the direct-connected module of described encryption equipment
The correct response message that the encryption equipment of described first application is replied, then the encryption equipment to the second application sends described
The pending data of the first application.
Optionally, described encryption equipment proxy module, specifically for:
An encryption equipment, wherein, one second application corresponding is selected from the encryption equipment of multiple second application
Individual encryption equipment;
Encryption equipment to described second application selected sends the pending data of described first application.
Optionally, described encryption equipment proxy module, specifically for:
The encryption equipment of multiple second application is carried out prioritization;
Select the encryption equipment of the second application that priority is the highest.
Optionally, described encryption equipment proxy module, specifically for:
If the direct-connected module of described encryption equipment does not receives described first application in described first Preset Time
The response message of encryption equipment;Or
The direct-connected module of described encryption equipment receives the encryption of described first application in described first Preset Time
The error message that machine sends,
Then the encryption equipment to described second application sends the pending data of described first application.
Optionally, described encryption equipment proxy module is additionally operable to:
After the encryption equipment of the second application sends the pending data of described first application, it may be judged whether arrive
Second Preset Time, the most then the encryption equipment to described first application sends the pending of described first application
Data;
Otherwise, continue to send the pending number of follow-up described first application to the encryption equipment of described second application
According to.
In the embodiment of the present invention, the first application has pending data to need encryption equipment to process, first should to first
Pending data are sent with direct-connected encryption equipment.After the encryption equipment determining the first application is unavailable, application clothes
The pending data that first applies are sent to the encryption equipment of the second application by business device, and the encryption equipment of the second application is i.e.
For the encryption equipment direct-connected with the second application.It is to say, using the second encryption equipment applied as the first application
Spare cryptographic machine, it is not necessary to encryption equipment is additionally set as spare cryptographic machine.Thus, eliminate increase standby to add
Close machine, saves encryption equipment resource.It addition, the encryption equipment of the second application is as the primary encryption of the second application
Machine, in the case of the encryption equipment of the first application normally uses, the most normally works, it is to avoid there is idle add
The situation of close machine, makes full use of existing encryption equipment resource, improves resource utilization, it is achieved that encryption equipment
The high availability of resource.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, institute in embodiment being described below
The accompanying drawing used is needed to briefly introduce, it should be apparent that, the accompanying drawing in describing below is only the present invention's
Some embodiments, from the point of view of those of ordinary skill in the art, in the premise not paying creative work
Under, it is also possible to other accompanying drawing is obtained according to these accompanying drawings.
Fig. 1 is application and the connection diagram of encryption equipment in prior art;
Fig. 2 is the flow chart of data processing method based on encryption equipment in the embodiment of the present invention;
Fig. 3 is the connection diagram of application, encryption equipment proxy module and encryption equipment in the embodiment of the present invention;
Fig. 4 is the connection diagram of a kind of application in the embodiment of the present invention, encryption equipment proxy module and encryption equipment;
Fig. 5 is the flow chart of a kind of data processing method based on encryption equipment in the embodiment of the present invention;
Fig. 6 is the connection signal of another kind of application, encryption equipment proxy module and encryption equipment in the embodiment of the present invention
Figure;
Fig. 7 is the schematic diagram of data processing equipment based on encryption equipment in the embodiment of the present invention.
Detailed description of the invention
In order to make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to this
Bright it is described in further detail, it is clear that described embodiment is only some embodiments of the present invention,
Rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing
Go out all other embodiments obtained under creative work premise, broadly fall into the scope of protection of the invention.
The external encryption device that encryption equipment is attached on main frame, and between main frame, use TCP/IP (transmission control
Agreement/Internet Protocol processed, Transmission Control Protocol/Internet Protocol) communication.
Can include multiple application of process business in main frame i.e. application server, each application configuration one is primary
Encryption equipment.When application has data message to need to carry out the process such as encryption and decryption, it would be desirable to the data of process send
To encryption equipment.If the encryption equipment of certain application breaks down, the data message of this application will be unable to process,
Can cause whole flow chart of data processing that terminal occurs, affect the use of user.Prior art additionally arranges one
Individual spare cryptographic machine, as shown in Figure 1.Each application is connected except the encryption equipment with this application, is also connected with standby
Use encryption equipment.When primary encryption equipment is unavailable, the data of this application are sent to standby by application server
Encryption equipment processes.Data processing method of the prior art can cause the redundancy of encryption equipment resource to waste.
In order to solve the problems referred to above, embodiments provide a kind of data process side based on encryption equipment
Method, the flow process of the method is as in figure 2 it is shown, method may include steps of:
S101, application server send the pending data of described first application to the encryption equipment of the first application;
If the described application server of S102 does not receives the encryption of described first application in the first Preset Time
The correct response message that machine is replied, the most described application server sends described first to the encryption equipment of the second application
The pending data of application.
In the embodiment of the present invention, the first application has pending data to need encryption equipment to process, first should to first
Pending data are sent with direct-connected encryption equipment.After the encryption equipment determining the first application is unavailable, application clothes
The pending data that first applies are sent to the encryption equipment of the second application by business device, and the encryption equipment of the second application is i.e.
For the encryption equipment direct-connected with the second application.It is to say, using the second encryption equipment applied as the first application
Spare cryptographic machine, it is not necessary to encryption equipment is additionally set as spare cryptographic machine.Thus, eliminate increase standby to add
Close machine, saves encryption equipment resource.It addition, the encryption equipment of the second application is as the primary encryption of the second application
Machine, in the case of the encryption equipment of the first application normally uses, the most normally works, it is to avoid there is idle add
The situation of close machine, makes full use of existing encryption equipment resource, improves resource utilization, it is achieved that encryption equipment
The high availability of resource.
Above-mentioned second application can be multiple second application, i.e. there is multiple application in application server and processes industry
Business, using one of them application as the first application, remaining is the second application.Therefore, above-mentioned steps S101
Including:
Described application server selects an encryption equipment, wherein, one from the encryption equipment of multiple second application
The second corresponding encryption equipment of application;
What the encryption equipment transmission described first that described application server is applied to second selected was applied waits to locate
Reason data.
Specifically, application server includes multiple application, the corresponding primary encryption equipment of each application,
This primary encryption equipment is joined directly together, when application has data to need encryption equipment to process with corresponding application
Time, first send the data to direct-connected primary encryption equipment.It addition, set up encryption equipment in the application server
Proxy module, this module one end is connected with each application in application server, and the other end connects application service
Each encryption equipment outside device, as shown in Figure 3.When the encryption equipment that certain application is corresponding is unavailable, this application
Data to be processed need to be sent to encryption equipment proxy module, encryption equipment proxy module is from remaining application correspondence
Encryption equipment in select an encryption equipment, the encryption equipment sending the data to choose processes.
In prior art, if the direct-connected multiple primary encryption equipment of main frame is the most unavailable, all disabled masters
All switch to spare cryptographic machine by the business of encryption equipment process, will result in standby encryption equipment overload.This
In inventive embodiments, if there being multiple disabled primary encryption equipment, then business can be shared to multiple spare cryptographic
Machine processes, has equalized the load of encryption equipment, prevent single encryption equipment overload.
In prior art, another way is all application not to be directly connected to encryption equipment, by encryption equipment generation
Reason module is connected to multiple encryption equipment, when application needs to send to encryption equipment pending data, first will
Pending data send to encryption equipment proxy module, encryption equipment proxy module select from all encryption equipments
One, pending data are sent to the encryption equipment chosen.There is higher risk in this mode, if encryption
Machine proxy module is abnormal, and all encryption equipments will be caused the most unavailable, and Business Processing stops.The embodiment of the present invention
In, apply direct-connected primary encryption equipment, utilize encryption equipment proxy module to manage spare cryptographic machine, normal condition
Lower utilizing primary encryption equipment to process data, primary encryption equipment breaks down to switch to and utilizes spare cryptographic machine
Processing, the most primary encryption equipment and standby encryption equipment all break down just can be to the flow process of Business Processing
Produce impact, therefore, shared failure risk, improve the high availability of encryption equipment.
It should be noted that in the embodiment of the present invention first application, second application be for convenience understand and
Statement, and non restrictive description.Arbitrary application in application server all can be as the first application, it is possible to makees
It it is the second application.When certain application in application server is as the first application, relative to this first application
Speech, remaining application is the second application.When another application as first application time, upper one as first
The application of application is then the second application.This is not limited by the embodiment of the present invention.
In the embodiment of the present invention, when the encryption equipment of the first application is unavailable, switch to the encryption of the second application
Machine processes, and wherein, the encryption equipment of the first application is unavailable shows that application server is in the first Preset Time
Do not receive the correct response message that the encryption equipment of described first application is replied, including:
Described application server does not receives the encryption equipment of described first application in described first Preset Time
The message sent;Or
Described application server receives the encryption equipment of described first application in described first Preset Time
Response message.
Specifically, encryption equipment is unavailable includes multiple situation, as encryption equipment self breaks down, applies clothes
Connecting between business device and encryption equipment be abnormal, mutual abnormal etc. between application server and encryption equipment.Specifically
Show that application server, after encryption equipment sends data message, does not receives encryption equipment in the first Preset Time
The message replied, then it is assumed that the encryption equipment of the first application is unavailable.Or, application server is preset first
Receive the message that encryption equipment is replied in time, but the message of this reply sends to encryption equipment with application server
Message the most corresponding, as error messages such as mess codes, after application server receives the message that encryption equipment is replied,
Judge that the message replied is error message, be then also considered as application server and do not receive in the first Preset Time
The correct response message that encryption equipment is replied, the encryption equipment of the i.e. first application is unavailable.
After judging that the first encryption equipment applied is unavailable, will the first pending data applied send to adding
Close machine proxy module, is selected one to process the by encryption equipment proxy module in the encryption equipment of multiple second application
The pending data of one application.Specifically chosen mode can be to randomly choose, and i.e. encryption equipment proxy module is
The encryption equipment of two application randomly chooses an encryption equipment, is sent to pending data.If this second application
Encryption equipment can use, in follow-up a period of time, first application pending data all issue this second should
Encryption equipment process.If this second application encryption equipment unavailable, then continue from remaining second should
Encryption equipment in randomly choose one, send pending data, until randomly choose second application add
Close machine can be used.Wherein judge the second encryption equipment applied whether can method can apply with above-mentioned judgement first
Encryption equipment whether can method identical.
It is preferred that select the mode of the encryption equipment of the second application to be carried out preferentially by the encryption equipment that second applies
Level sequence, i.e. application server select an encryption equipment from the encryption equipment of multiple second application, including:
The encryption equipment of multiple second application is carried out prioritization by described application server;
Described application server selects the encryption equipment of the second application that priority is the highest.
Specifically, can carry out excellent based on the one or more encryption equipments to the second application in following key element
First level sequence: encryption equipment feature list, line status, functional status, average response time, call the frequency.
Wherein, on the premise of the encryption equipment of the second application can connect and line status and functional status are all normal, can
The encryption equipment of the second application is carried out with calling the frequency according to the average response time of the encryption equipment of the second application
Prioritization.
Such as, first application server according to the load of encryption equipment, selects negative from the encryption equipment of the second application
Carry minimum one or more encryption equipments;Then, from the one or more encryption equipments selected, select further
Go out the encryption equipment that Business Processing is the fastest.The priority of encryption equipment based on the second application, first to priority
High encryption equipment sends the pending data of the first application, if the encryption equipment successful execution that this priority is the highest
Process task, in follow-up a period of time, continues the pending data by first applies and is sent to this priority
The highest encryption equipment;If the encryption equipment that priority is the highest can not perform process task, then according to priority orders
Select the encryption equipment of next priority, be sent to pending data, until pending data are successfully processed.
For another example, in application server, include applying 1~7, connect 7 encryption equipments, wherein encryption equipment 2,4
Break down with 5.When encryption equipment 2 breaks down, application server is first according to the function shape of encryption equipment
Remaining 6 encryption equipment is carried out prioritization by state and average response time, and after sequence, encryption equipment 3 is excellent
First level is the highest, then the data of encryption equipment 2 are sent to encryption equipment 3 and process by application server.Add afterwards
Close machine 4 breaks down, and owing to encryption equipment 2 also breaks down, is then entered by encryption equipment 1,3,5,6 and 7
Row major level sorts.It should be noted that encryption equipment 3 has processed the pending data of application 2, here
Encryption equipment 3 can be re-started prioritization, it is possible to foreclosed by encryption equipment 3, only from encryption equipment
1, selecting in 5,6 and 7, this is only for example by the embodiment of the present invention, does not limits.From 5 encryption equipments
In select the highest encryption equipment of priority 5, for process application 4 data.Followed by, encryption equipment 5
Break down, then from encryption equipment 1,3,6 and 7, select the highest encryption equipment of priority 7.Owing to adding
Close machine 5 is processing application 4 and the pending data of application 5 before breaking down, then will application 4 and application 5
Pending data be sent to encryption equipment 7.
In the embodiment of the present invention, encryption equipment is carried out prioritization and sorts for real-time, i.e. encrypt according to certain
When machine breaks down, the state that remaining encryption equipment is current, remaining encryption equipment is ranked up.Add when next time has
When close machine breaks down, then re-start prioritization.This is because at the performance of encryption equipment and encryption equipment
The pending data of the application of reason are relevant, and the data that each time period encryption equipment processes are different, the number of process
Also different according to amount, therefore the disposal ability of encryption equipment can change, and when switching is called, need to carry out real-time priority
Sequence.
Encryption equipment can recover normal by the mode such as self-starting, self-shield, above-mentioned by first apply pending
Data send to second application encryption equipment process after, after a period of time, then by first apply wait locate
Reason data send the encryption equipment to the first application.That is, application server sends institute to the encryption equipment of the second application
After stating the pending data of the first application, including:
Described application server judges whether to arrive the second Preset Time, the most then continuing should to described first
Encryption equipment send described first application follow-up pending data;
Otherwise, the encryption equipment to described second application sends the pending data of described first application.
Specifically, application server is from the pending data sending the first application to the encryption equipment of the second application
Start timing, after arriving the second Preset Time, automatically switch back into the encryption equipment connecting the first application, will
The pending data of the first application are sent to the encryption equipment of the first application.If the encryption equipment of the first application can be used,
Then the encryption equipment of place's reason first application of follow-up data performs.If the encryption equipment of the first application is the most unavailable,
Then the pending data after the first application will be sent to the encryption equipment of the second application and process, and recalculate
Time.In prior art, after business is switched to the process of spare cryptographic machine, it is impossible to switchback adds to the most direct-connected automatically
Close machine, needs manual intervention.So, when when direct-connected encryption equipment recovers normal, spare cryptographic machine breaks down,
Automatically business cannot be switched back into direct-connected encryption equipment, Business Processing will be affected, lack robustness.And the present invention
In embodiment, the switching of encryption equipment, without manual intervention, can realize automatic switchover and recovery that encryption equipment calls,
Thus ensure that processing procedure is not interrupted, improve high availability and the robustness of encryption equipment.
In order to be more clearly understood that the present invention, with instantiation, above-mentioned flow process is described in detail below.
In a kind of embodiment of the present invention, as shown in Figure 4, have in application server application A, B, C and
D, and encryption equipment proxy module.Four application are connected respectively encryption equipment a, b, c and d, encryption
One end of machine proxy module connects four application, and one end connects four encryption equipments.In embodiment, application service
The pending data of business B of device need to be encrypted operation, and concrete steps are as it is shown in figure 5, include:
The pending data of business B are sent to encryption equipment b by the direct-connected module of S201, encryption equipment.
The direct-connected module of S202, encryption equipment judges whether receive what encryption equipment b sent in the first Preset Time
Correctly reply message, if so, perform step S201;Otherwise, step S203 is performed.
The encryption that the pending data of business B are sent in application server by the direct-connected module of S203, encryption equipment
Machine proxy module.
After S204, encryption equipment proxy module receive the pending data of business B, by encryption equipment a, c and
D carries out prioritization.
S205, encryption equipment proxy module, according to priority orders, select one from encryption equipment a, c and d
Available encryption equipment, sends the pending data of business B, and starts timing.
S206, encryption equipment proxy module judge whether to arrive the second Preset Time, the most then perform step
S201;Otherwise, step S203 is performed.
Above-described embodiment is the switching being encrypted machine in an application server.It is preferred that the present invention is real
Execute example and can also be encrypted the switching of machine between multiple application servers.Such as, as shown in Figure 6, four
Individual application server J, K, L and M, connect encryption equipment j, k, l and m of correspondence, each application respectively
Server includes application and an encryption equipment proxy module.Each application is directly connected to an encryption equipment, and
By the encryption equipment proxy module in same application server, it is indirectly connected to other encryption equipment applied.
During it should be noted that be encrypted the switching of machine between multiple application servers, application clothes
In business device, an application can be comprised, it is also possible to comprising multiple application, this is only shown by the embodiment of the present invention
Example, does not limits.
Based on identical technology design, the embodiment of the present invention also provides for data processing equipment based on encryption equipment,
As it is shown in fig. 7, comprises:
The direct-connected module of encryption equipment 11, for sending the pending of described first application to the encryption equipment of the first application
Data;
Encryption equipment proxy module 12, if not receiving in the first Preset Time for the direct-connected module of described encryption equipment
The correct response message replied to the encryption equipment of described first application, then the encryption equipment to the second application sends institute
State the pending data of the first application.
Optionally, encryption equipment proxy module 12, specifically for:
An encryption equipment, wherein, one second application corresponding is selected from the encryption equipment of multiple second application
Individual encryption equipment;
Encryption equipment to described second application selected sends the pending data of described first application.
Optionally, encryption equipment proxy module 12, specifically for:
The encryption equipment of multiple second application is carried out prioritization;
Select the encryption equipment of the second application that priority is the highest.
Optionally, encryption equipment proxy module 12, specifically for:
If the direct-connected module of encryption equipment 11 does not receives adding of described first application in described first Preset Time
The response message of close machine;Or
The direct-connected module of encryption equipment 11 receives the encryption equipment of described first application in described first Preset Time
The error message sent,
Then the encryption equipment to described second application sends the pending data of described first application.
Optionally, encryption equipment proxy module 12 is additionally operable to:
After the encryption equipment of the second application sends the pending data of described first application, it may be judged whether arrive
Second Preset Time, the most then the encryption equipment to described first application sends the pending of described first application
Data;
Otherwise, continue to send the pending number of follow-up described first application to the encryption equipment of described second application
According to.
The present invention is with reference to method, equipment (system) and computer program product according to embodiments of the present invention
The flow chart of product and/or block diagram describe.It should be understood that can by computer program instructions flowchart and
/ or block diagram in each flow process and/or flow process in square frame and flow chart and/or block diagram and/
Or the combination of square frame.These computer program instructions can be provided to general purpose computer, special-purpose computer, embedding
The processor of formula datatron or other programmable data processing device is to produce a machine so that by calculating
The instruction that the processor of machine or other programmable data processing device performs produces for realizing at flow chart one
The device of the function specified in individual flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and computer or the process of other programmable datas can be guided to set
In the standby computer-readable memory worked in a specific way so that be stored in this computer-readable memory
Instruction produce and include the manufacture of command device, this command device realizes in one flow process or multiple of flow chart
The function specified in flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, makes
Sequence of operations step must be performed to produce computer implemented place on computer or other programmable devices
Reason, thus the instruction performed on computer or other programmable devices provides for realizing flow chart one
The step of the function specified in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know base
This creativeness concept, then can make other change and amendment to these embodiments.So, appended right is wanted
Ask and be intended to be construed to include preferred embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and modification without deviating from this to the present invention
Bright spirit and scope.So, if the present invention these amendment and modification belong to the claims in the present invention and
Within the scope of its equivalent technologies, then the present invention is also intended to comprise these change and modification.
Claims (10)
1. a data processing method based on encryption equipment, it is characterised in that including:
Application server sends the pending data of described first application to the encryption equipment of the first application;
If the encryption equipment that described application server does not receives described first application in the first Preset Time returns
Multiple correct response message, the most described application server sends described first application to the encryption equipment of the second application
Pending data.
2. the method for claim 1, it is characterised in that described application server is to the second application
Encryption equipment send described first application pending data, including:
Described application server selects an encryption equipment, wherein, one from the encryption equipment of multiple second application
The second corresponding encryption equipment of application;
What the encryption equipment transmission described first that described application server is applied to second selected was applied waits to locate
Reason data.
3. method as claimed in claim 2, it is characterised in that described application server is from multiple second
The encryption equipment of application selects an encryption equipment, including:
The encryption equipment of multiple second application is carried out prioritization by described application server;
Described application server selects the encryption equipment of the second application that priority is the highest.
4. the method for claim 1, it is characterised in that described application server is preset first
The correct response message that the encryption equipment of described first application is replied is not received in time, including:
Described application server does not receives the encryption equipment of described first application in described first Preset Time
Response message;Or
Described application server receives the encryption equipment of described first application in described first Preset Time and sends out
The error message sent.
5. the method for claim 1, it is characterised in that described application server is to the second application
Encryption equipment send described first application pending data after, also include:
Described application server judges whether to arrive the second Preset Time, the most then to described first application
Encryption equipment sends the pending data of described first application;
Otherwise, continue to send the follow-up pending number of described first application to the encryption equipment of described second application
According to.
6. a data processing equipment based on encryption equipment, it is characterised in that including:
The direct-connected module of encryption equipment, for sending the pending number of described first application to the encryption equipment of the first application
According to;
Encryption equipment proxy module, if not receiving in the first Preset Time for the direct-connected module of described encryption equipment
The correct response message that the encryption equipment of described first application is replied, then the encryption equipment to the second application sends described
The pending data of the first application.
7. device as claimed in claim 6, it is characterised in that described encryption equipment proxy module, specifically
For:
An encryption equipment, wherein, one second application corresponding is selected from the encryption equipment of multiple second application
Individual encryption equipment;
Encryption equipment to described second application selected sends the pending data of described first application.
8. device as claimed in claim 7, it is characterised in that described encryption equipment proxy module, specifically
For:
The encryption equipment of multiple second application is carried out prioritization;
Select the encryption equipment of the second application that priority is the highest.
9. device as claimed in claim 6, it is characterised in that described encryption equipment proxy module, specifically
For:
If the direct-connected module of described encryption equipment does not receives described first application in described first Preset Time
The response message of encryption equipment;Or
The direct-connected module of described encryption equipment receives the encryption of described first application in described first Preset Time
The error message that machine sends,
Then the encryption equipment to described second application sends the pending data of described first application.
10. device as claimed in claim 6, it is characterised in that described encryption equipment proxy module is additionally operable to:
After the encryption equipment of the second application sends the pending data of described first application, it may be judged whether arrive
Second Preset Time, the most then the encryption equipment to described first application sends the pending of described first application
Data;
Otherwise, continue to send the pending number of follow-up described first application to the encryption equipment of described second application
According to.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511016898.2A CN105933271B (en) | 2015-12-29 | 2015-12-29 | Data processing method and device based on encryption machine |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511016898.2A CN105933271B (en) | 2015-12-29 | 2015-12-29 | Data processing method and device based on encryption machine |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105933271A true CN105933271A (en) | 2016-09-07 |
CN105933271B CN105933271B (en) | 2020-05-01 |
Family
ID=56839973
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511016898.2A Active CN105933271B (en) | 2015-12-29 | 2015-12-29 | Data processing method and device based on encryption machine |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105933271B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109729064A (en) * | 2018-05-14 | 2019-05-07 | 网联清算有限公司 | Encryption equipment fault handling method and information processing system |
WO2019218975A1 (en) * | 2018-05-14 | 2019-11-21 | 网联清算有限公司 | Information processing method and information processing system for encryptor |
CN110839020A (en) * | 2019-10-25 | 2020-02-25 | 网联清算有限公司 | Security service calling method and security service calling system |
CN114025024A (en) * | 2021-10-18 | 2022-02-08 | 中国银联股份有限公司 | Data transmission method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103546427A (en) * | 2012-07-11 | 2014-01-29 | 中国银联股份有限公司 | Method and system for realizing high availability of encryption machine application |
CN103701583A (en) * | 2012-09-28 | 2014-04-02 | 中国银联股份有限公司 | Encryption processing device and method |
CN104539406A (en) * | 2014-12-05 | 2015-04-22 | 浪潮集团有限公司 | Double control network encryptor system |
-
2015
- 2015-12-29 CN CN201511016898.2A patent/CN105933271B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103546427A (en) * | 2012-07-11 | 2014-01-29 | 中国银联股份有限公司 | Method and system for realizing high availability of encryption machine application |
CN103701583A (en) * | 2012-09-28 | 2014-04-02 | 中国银联股份有限公司 | Encryption processing device and method |
CN104539406A (en) * | 2014-12-05 | 2015-04-22 | 浪潮集团有限公司 | Double control network encryptor system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109729064A (en) * | 2018-05-14 | 2019-05-07 | 网联清算有限公司 | Encryption equipment fault handling method and information processing system |
WO2019218975A1 (en) * | 2018-05-14 | 2019-11-21 | 网联清算有限公司 | Information processing method and information processing system for encryptor |
CN109729064B (en) * | 2018-05-14 | 2021-04-20 | 网联清算有限公司 | Encryption machine fault processing method and information processing system |
US11641350B2 (en) | 2018-05-14 | 2023-05-02 | Netsunion Clearing Corporation | Information processing method and information processing system for encryption machine |
CN110839020A (en) * | 2019-10-25 | 2020-02-25 | 网联清算有限公司 | Security service calling method and security service calling system |
CN114025024A (en) * | 2021-10-18 | 2022-02-08 | 中国银联股份有限公司 | Data transmission method and device |
CN114025024B (en) * | 2021-10-18 | 2023-07-07 | 中国银联股份有限公司 | Data transmission method and device |
Also Published As
Publication number | Publication date |
---|---|
CN105933271B (en) | 2020-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105933271A (en) | Data processing method and apparatus based on encoder | |
CN105099889A (en) | Order notification method, apparatus and system | |
CN102882704B (en) | Link protection method in the soft reboot escalation process of a kind of ISSU and equipment | |
US10764939B2 (en) | Network function processing method and related device | |
CN105939201A (en) | Method and device for checking state of server | |
WO2017107656A1 (en) | Virtualized network element failure self-healing method and device | |
CN107948063B (en) | Method for establishing aggregation link and access equipment | |
CN103795569A (en) | Server connection method and device based on connection pool | |
CN110768840A (en) | Control method, device, equipment and storage medium of communication equipment | |
CN111143031A (en) | Method and device for changing capacity of virtual machine | |
CN104298565A (en) | Method and device for initializing ports | |
WO2017000096A1 (en) | Link recovery method and network device | |
WO2021179841A1 (en) | Microservice invoking method and apparatus, device and medium | |
CN105933270A (en) | Cloud encryptor processing method and apparatus | |
CN111741175B (en) | Call center system, signal transmission method, device, server and medium | |
CN107025126B (en) | Resource scheduling method, NFVO and system | |
CN104539462A (en) | Method and device for switching disaster recovery application example | |
CN103959723A (en) | Re-routing method, system and network deivce | |
CN104869118A (en) | Method and system for achieving DDoS defense based on technology of dynamic tunnels | |
CN115665035A (en) | Information processing method and device, first node and storage medium | |
CN113535402A (en) | Load balancing processing method and device based on 5G MEC and electronic equipment | |
CN106230878A (en) | A kind of equipment service calling method based on AllJoyn framework and device | |
CN109981796B (en) | Connection method and device | |
CN108712782B (en) | Tunnel establishment method and device, electronic equipment and readable storage medium | |
CN106992878B (en) | Multicast detection method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |